Listing 1 - 6 of 6 |
Sort by
|
Choose an application
This book constitutes the refereed proceedings of 3 workshops held at the 22nd International Conference on Financial Cryptography and Data Security, FC 2018, in Nieuwport, Curaçao, in March 2018. The 23 full papers presented together with 2 short papers were carefully reviewed and selected from 52 submissions. They feature the outcome of the 5th Workshop on Bitcoin and Blockchain Research, BITCOIN 2018, the Third Workshop on Secure Voting Systems, VOTING 2018,and the Second Workshop on Trusted Smart Contracts, WTSC 2018. The papers are grouped in topical sections named: Blockchain, Distributed Ledgers, Cryptography, Bitcoin, Voting, and Smart Contracts.
Choose an application
This book constitutes the refereed proceedings of two workshops held at the 23rd International Conference on Financial Cryptography and Data Security, FC 2019, in St. Kitts, St. Kitts and Nevis, in February 2019. The 20 full papers and 4 short papers presented in this book were carefully reviewed and selected from 34 submissions. The papers feature the outcome of the 4th Workshop on Advances in Secure Electronic Voting, VOTING 2019 and the Third Workshop on Trusted Smart Contracts, WTSC 2019. VOTING covered topics like election auditing, voting system efficiency, voting system usability, and new technical designs for cryptographic protocols for voting systems. WTSC focuses on smart contracts, i.e., self-enforcing agreements in the form of executable programs, and other decentralized applications that are deployed to and run on top of (specialized) blockchains. .
Data encryption (Computer science). --- Application software. --- Architecture, Computer. --- Database management. --- Computer communication systems. --- Cryptology. --- Information Systems Applications (incl. Internet). --- Computer System Implementation. --- Database Management. --- Computer Communication Networks. --- Architecture, Computer --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Data base management --- Data services (Database management) --- Database management services --- DBMS (Computer science) --- Generalized data management systems --- Services, Database management --- Systems, Database management --- Systems, Generalized database management --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Distributed processing
Choose an application
Programming --- Computer architecture. Operating systems --- Information systems --- Computer. Automation --- applicatiebeheer --- apps --- informatica --- database management --- computernetwerken --- architectuur (informatica)
Choose an application
This book constitutes the refereed proceedings of two workshops held at the 23rd International Conference on Financial Cryptography and Data Security, FC 2019, in St. Kitts, St. Kitts and Nevis, in February 2019. The 20 full papers and 4 short papers presented in this book were carefully reviewed and selected from 34 submissions. The papers feature the outcome of the 4th Workshop on Advances in Secure Electronic Voting, VOTING 2019 and the Third Workshop on Trusted Smart Contracts, WTSC 2019. VOTING covered topics like election auditing, voting system efficiency, voting system usability, and new technical designs for cryptographic protocols for voting systems. WTSC focuses on smart contracts, i.e., self-enforcing agreements in the form of executable programs, and other decentralized applications that are deployed to and run on top of (specialized) blockchains. .
Programming --- Computer architecture. Operating systems --- Information systems --- Computer. Automation --- applicatiebeheer --- apps --- informatica --- database management --- computernetwerken --- architectuur (informatica)
Choose an application
Choose an application
This book constitutes the refereed proceedings of 5 workshops held at the 21st International Conference on Financial Cryptography and Data Security, FC 2017, in Sliema, Malta, in April 2017. The 39 full papers presented were carefully reviewed and selected from 96 submissions. They feature the outcome of the 5th Workshop on Encrypted Computing and Applied Homomorphic Cryptography, WAHC 2017, the 4th Workshop on Bitcoin and Blockchain Research, BITCOIN 2017, the Second Workshop on Secure Voting Systems, VOTING 2017, the First Workshop on Trusted Smart Contracts, WTSC 2017, and the First Workshop on Targeted Attacks, TA 2017. The papers are grouped in topical sections named: encrypted computing and applied homomorphic cryptography; bitcoin and blockchain research; advances in secure electronic voting schemes; trusted smart contracts; targeted attacks.
Computer science. --- Computer organization. --- Computer security. --- Data encryption (Computer science). --- Computers. --- Computer Science. --- Systems and Data Security. --- Data Encryption. --- Information Systems and Communication Service. --- Computing Milieux. --- Computer Systems Organization and Communication Networks. --- Computing Methodologies. --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Organization, Computer --- Informatics --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Protection --- Security measures --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Computer security --- Cryptography --- Data protection --- Security systems --- Hacking --- Science --- Information systems. --- Computer network architectures. --- Artificial intelligence. --- Cryptology. --- Artificial Intelligence. --- AI (Artificial intelligence) --- Artificial thinking --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Architectures, Computer network --- Network architectures, Computer --- Computer architecture --- Data encryption (Computer science)
Listing 1 - 6 of 6 |
Sort by
|